Faster Digital Forensic Analysis

Examining seized computers and devices for incriminating evidence is a slow and time-consuming process. Searching seized computers consumes valuable working time and delays the availability of evidence. Scanning through seized computers often delays an investigation and can cause an  accumulation of unfinished work in digital forensic labs.

Cyan Forensics, a startup based in Edinburgh, Scotland, whose technology helps police investigators to find evidence faster, has secured a €1.5 million additional funding from a consortium of investors and is now developing a new set of digital forensic tools capable of scanning devices in a matter of minutes. 

The software also helps accelerate processing, it can prioritise the analysis of devices that are known to contain illegal files.
The company’s software allows investigators to make quick and confident decision and helps prevent further crime ranging from terrorism to human trafficking. Within a matter of minutes, Cyan’s solution will be able to supply an investigator with enough evidence to confront suspects and know where to focus a full forensic investigation. 

Automated scans using MD5 hashes of known illegal content, such as illegal images of children or terrorist handbooks, are a valuable tool for finding evidence quickly and minimising the need for forensic analyst time. Such scans take many hours, or even days on devices with high capacity storage or slow external interfaces.

The company’s website mentions that the technology works in three steps. The first step is the preparation stage, where the system extracts relevant information from a database. 

So if the investigation is a terror investigation, the system will extract bomb-making guides or terrorist manifestos from the database. If a child sexual exploitation case is being investigated, then the extracted data from the database will likely be illegal images.

The next stage is the triage stage. The system is capable of filtering out files that almost definitely do not contain any contraband. This allows the system to scan seized computers, devices, and hard drives within minutes. 

When traditional scanning methods would take 35 minutes to scan an 80 gigabyte hard drive, Cyan Forensics’ system would only take two minutes to scan. Similarly, it would take Cyan only 27 minutes to scan a terabyte of data, where it will take traditional scanners over 7 hours to scan.

The Cyan system provides tools that show rapid results allowing analysts to focus their investigative efforts on devices that are likely to contain incriminating evidence.The system provides investigators with a useful set of tools that help stop criminals and solve crimes.

Cyan Forensics:         EU Startups:        I-HLS

You Might Also Read: 

Authenticating Digital Evidence:

 

 

 

 

« Attack Vectors Are Proliferating
US Government Cyber Security Still Needs Work »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Infosecurity Europe, 3-5 June 2025, ExCel London

Infosecurity Europe, 3-5 June 2025, ExCel London

This year, Infosecurity Europe marks 30 years of bringing the global cybersecurity community together to further our joint mission of Building a Safer Cyber World.

Caldew Consulting

Caldew Consulting

Caldew specialise in providing information assurance and cyber security consultancy, covering the full spectrum of the security life cycle.

Blueliv

Blueliv

Blueliv is a leading provider of targeted cyber threat information and intelligence. We deliver automated and actionable threat intelligence to protect the enterprise and manage your digital risk.

Virtual Security

Virtual Security

Virtual Security provides solutions in the field of managed security services, network security, secure remote work, responsible internet, application security, encryption, BYOD and compliance.

JPCERT/CC

JPCERT/CC

JPCERT/CC is the first Computer Security Incident Response Team (CSIRT) established in Japan.

SIGA

SIGA

SIGA provides cyber security solutions for Industrial Control Systems SCADA systems used in critical infrastructures and industrial processes.

Recruit.net

Recruit.net

Recruit.net allows job seekers to instantly find millions of jobs from thousands of web sites with a single search.

Control System Cyber Security Association International (CS2AI)

Control System Cyber Security Association International (CS2AI)

CS2AI is the premier global not for profit workforce development organization supporting professionals of all levels charged with securing control systems.

Lunio

Lunio

Lunio makes the internet a safer and more reliable place for everyone trying to grow their business by automatically getting rid of fake clicks, traffic, and leads on all ad platforms.

SecureStream Technologies

SecureStream Technologies

SecureStream Technologies have built the IoT SafetyNet - the Network Security Analytics platform to Eliminate Security Threats, Guarantee Privacy, Ensure Compliance, Simply & Easily.

Plex IT

Plex IT

Plex IT provides managed IT services to organisations along with managed security services.

Bores Security Consultancy

Bores Security Consultancy

Bores Security Consultancy are an established family-run business delivering expertise in security and technology.

NewEvol

NewEvol

Don’t React, Evolve! Outsmart threats with real-time AI-powered dynamic defense capability of NewEvol all-in-one cybersecurity platform.

Waterleaf International

Waterleaf International

Waterleaf provide advanced network and cybersecurity solutions - informed by data sciences. Transforming Connectivity, Security and Information for Municipalities, Government & Enterprise.

VT Group (VTG)

VT Group (VTG)

VTG delivers force modernization and digital transformation solutions that expand America’s competitive advantage in the modern battlespace.

St Fox

St Fox

St. Fox is a leading consultancy helping enterprises secure their Cloud, Data, endpoints, and applications.

Andesite

Andesite

Andesite is delivering sustained advantage to cyber defense teams through technology and community.